Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2012
- Nedal Ababneh, Nicholas Timmons, Jim Morrison:
An Adaptive Bandwidth Allocation Scheme for Data Streaming over Body Area Networks. WWIC 2012: 90-101 - Ehsan Ahvar, René Serral-Gracià, Eva Marín-Tordera, Xavier Masip-Bruin, Marcelo Yannuzzi:
EQR: A New Energy-Aware Query-Based Routing Protocol for Wireless Sensor Networks. WWIC 2012: 102-113 - Theodoros Amanatidis, Anastasios Malkotsis:
DTN-tg A DTN Traffic Generator. WWIC 2012: 374-379 - Runa Barik, Dinil Mon Divakaran:
TCP Initial Window: A Study. WWIC 2012: 290-297 - Fraser Cadger, Kevin Curran, Jose A. Santos, Sandra Moffett:
MANET Location Prediction Using Machine Learning Algorithms. WWIC 2012: 174-185 - Anna Chaltseva, Evgeny Osipov:
On Passive Characterization of Aggregated Traffic in Wireless Networks. WWIC 2012: 282-289 - Nathan L. Clarke, Vasilios Katos, Sofia-Anna Menesidou, Bogdan V. Ghita, Steven Furnell:
A Novel Security Architecture for a Space-Data DTN. WWIC 2012: 342-349 - Ioannis A. Daglis, Olga Sykioti, Anastasios Anastasiadis, Georgios Balasis, Iphigenia Keramitsoglou, Dimitris Paronis, Athanasios A. Rontogiannis, Sotiris Diamantopoulos:
Space Mission Characteristics and Requirements to be Addressed by Space-Data Router Enhancement of Space-Data Exploitation. WWIC 2012: 366-373 - Desislava C. Dimitrova, Islam Alyafawi, Torsten Braun:
Experimental Comparison of Bluetooth and WiFi Signal Propagation for Indoor Localisation. WWIC 2012: 126-137 - Qian Dong, Waltenegus Dargie:
Analysis of the Cost of Handover in a Mobile Wireless Sensor Network. WWIC 2012: 315-322 - Olga Galinina, Sergey D. Andreev, Yevgeni Koucheryavy:
Performance Analysis of Client Relay Cloud in Wireless Cellular Networks. WWIC 2012: 40-51 - Ghazale Hosseinabadi, Nitin H. Vaidya:
Exploiting Opportunistic Overhearing to Improve Performance of Mutual Exclusion in Wireless Ad Hoc Networks. WWIC 2012: 162-173 - Chung-Hsien Hsu:
Direct Link Assignment Approach for IEEE 802.16 Networks. WWIC 2012: 220-231 - Eleftheria Katsiri:
Cirrus: A Disruption-Tolerant Cloud. WWIC 2012: 350-357 - Junyu Lai, Bernd E. Wolfinger:
A Method to Improve the Channel Availability of IPTV Systems with Users Zapping Channels Sequentially. WWIC 2012: 76-89 - Vasileios Lakafosis, Sreenivas Addagatla, Christian Belady, Suyash Sinha:
Prometheus: A Wirelessly Interconnected, Pico-Datacenter Framework for the Developing World. WWIC 2012: 26-39 - Sotirios-Angelos Lenas, Scott C. Burleigh, Vassilis Tsaoussidis:
Reliable Data Streaming over Delay Tolerant Networks. WWIC 2012: 358-365 - Christos Liaskos, Ageliki Tsioliaridou, Georgios I. Papadimitriou:
More for Less - Getting More Clients by Broadcasting Less Data. WWIC 2012: 64-75 - Christos Liaskos, Andreas Xeros, Georgios I. Papadimitriou, Marios Lestas, Andreas Pitsillides:
Periodic Scheduling with Costs Revisited - A Novel Approach for Wireless Broadcasting. WWIC 2012: 52-63 - José Marinho, Edmundo Monteiro:
Cooperative Sensing-Before-Transmit in Ad-Hoc Multi-hop Cognitive Radio Scenarios. WWIC 2012: 186-197 - Safdar Nawaz Khan Marwat, Thushara Weerawardane, Yasir Zaki, Carmelita Görg, Andreas Timm-Giel:
Performance Evaluation of Bandwidth and QoS Aware LTE Uplink Scheduler. WWIC 2012: 298-306 - Sarang Bharadwaj Masti, Siva P. Meenakshi, Serugudi V. Raghavan:
VNEMX: Virtual Network Embedding Test-Bed Using MPLS and Xen. WWIC 2012: 1-12 - Kaushik Mondal, Partha Sarathi Mandal, Bhabani P. Sinha:
Localization in Presence of Multipath Effect in Wireless Sensor Networks. WWIC 2012: 138-149 - Adetola Oredope, Guilherme Frassetto, Barry G. Evans:
An Evaluation of Vertical Handovers in LTE Networks. WWIC 2012: 198-207 - Panagiotis Papadimitriou, Ines Houidi, Wajdi Louati, Djamal Zeghlache, Christoph Werle, Roland Bless, Laurent Mathy:
Towards Large-Scale Network Virtualization. WWIC 2012: 13-25 - Giorgos Papastergiou, Nikolaos Bezirgiannidis, Vassilis Tsaoussidis:
On the Performance of Erasure Coding over Space DTNs. WWIC 2012: 269-281 - Matthew Stabeler, Conrad Lee, Pádraig Cunningham:
An Assessment of Community Finding Algorithms for Community-Based Message Routing in DTNs. WWIC 2012: 244-256 - Fani Tsapeli, Vassilis Tsaoussidis:
Routing for Opportunistic Networks Based on Probabilistic Erasure Coding. WWIC 2012: 257-268 - Okan Turkes, Sebnem Baydere:
Voice Quality Improvement with Error Concealment in Audio Sensor Networks. WWIC 2012: 307-314 - Dimitris Vardalis, Vassilis Tsaoussidis:
Achieving Energy-Efficiency with DTN: A Proof-of-Concept and Roadmap Study. WWIC 2012: 332-341
skipping 6 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-25 13:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint